Hi there

I like taking things apart, sometimes I even figure out how they work. This is just a place where I drop notes on vuln research, exploitation, and CTFs. List of CVEs here.

No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE

Following a previous post on ARM exploitation, this post walks through extracting and analyzing modern IoT firmware to discover a previously unknown vulnerability. We then construct an ARM ROP chain that bypasses ASLR without an address leak to achieve unauthenticated RCE. ...

November 10, 2025 · 1 min · 47 words · born0monday

ROPing our way to RCE

From vulnerability to exploit - this post explores the journey of developing an ARM ROP chain to exploit a buffer overflow in uc-http. ...

February 7, 2025 · 1 min · 29 words · born0monday

A Journey to the House of Tangerine

A couple of weeks ago my friend Sir_X told me about a heap challenge he was working on. Since I still have much to learn in this area, I decided to join him. Like most challenges of this kind, the journey was challenging but ultimately rewarding. ...

January 4, 2025 · 13 min · 2715 words · born0monday

Exploring CVE-2023-2163: My Intro to Kernel Hacking

Ever since I got into security, kernel exploitation has fascinated me. So for my bachelor’s thesis, I finally decided to take a first dive into this deep and complex field - one that always seems to have more layers to uncover. ...

December 30, 2024 · 1 min · 211 words · born0monday

Funtran - Maths to the Rescue

Last weekend I took on snakeCTF 2024 Quals. As I’m still focused on improving my binary skills, I decided to go for a reverse engineering challenge called Funtran. It certainly kept me busy for some hours and reminded me that paying attention in maths every now and then was worth it. :) ...

September 13, 2024 · 7 min · 1424 words · born0monday